Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 04:49

General

  • Target

    5aea56156ab7da5161f1d14261e77bd5_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    5aea56156ab7da5161f1d14261e77bd5

  • SHA1

    709050c574a9426c3058e216ff04538fe7b0488e

  • SHA256

    0c1296c11ed22130856eb97d47c8339936e92012fa7a9922b51ea14ecb9d8f64

  • SHA512

    ca642d6c9883e13dddd7565170480ae1dbe2f5fbcf11a41fe0b3ad299db955ac27707427bfdf3c76fbb4527010f83dc7339b24bb2f64d64cb389dc383445ae4b

  • SSDEEP

    24576:UV63UYgSZUX6dsgw83xUJjGXT3pcXRKY59Z1nRZI:VUWPjMZK

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

guyfawkesfc.no-ip.org:1604

Mutex

DC_MUTEX-MQD9M76

Attributes
  • gencode

    TWryUTMgn8jV

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5aea56156ab7da5161f1d14261e77bd5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5aea56156ab7da5161f1d14261e77bd5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\Floodjvc.exe
      "C:\Users\Admin\AppData\Local\Temp\Floodjvc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2340
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      "C:\Users\Admin\AppData\Local\Temp\test.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Floodjvc.exe

    Filesize

    46KB

    MD5

    b31884828f329fd0fc1f6e9336f97491

    SHA1

    5d1ec9182ca83a9200d335d1e20511598cebc5eb

    SHA256

    4290921396db0980b244a5420be4e11eddf5e127c8de6c051a6224c98272b99c

    SHA512

    e3f5bd12bd4dbd6ecdfad69a6965186ec40b8440b1d00cfb95e7c77860a48542c6cc1a08e10b69584a9d19313cb7a2a3b0fea8710c060e36827f7503ee667428

  • C:\Users\Admin\AppData\Local\Temp\test.exe

    Filesize

    758KB

    MD5

    28205def139e7630b9ede4ecff7d5480

    SHA1

    cc82f953e7a221438ddadc8a61f4dd27aeaea824

    SHA256

    61bf4f5c234956c6fd66a0fdc3e08277efc88b4520be4cb2f6b6dea72d6c692d

    SHA512

    9f0c9733840f4898dafd2db04ca357a62ad2b11df72a4c3a6743afcb37cfed2cf492d7c7949e6d638f1b3edeffc7e56374c3112e3422cffd7f74fcd1dedee1be

  • memory/2104-14-0x0000000073A41000-0x0000000073A42000-memory.dmp

    Filesize

    4KB

  • memory/2104-16-0x0000000000B60000-0x0000000000BA0000-memory.dmp

    Filesize

    256KB

  • memory/2104-17-0x0000000073A42000-0x0000000073A44000-memory.dmp

    Filesize

    8KB

  • memory/2104-19-0x0000000000B60000-0x0000000000BA0000-memory.dmp

    Filesize

    256KB

  • memory/2340-15-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

    Filesize

    4KB

  • memory/2340-18-0x00000000009D0000-0x00000000009E2000-memory.dmp

    Filesize

    72KB

  • memory/2492-0-0x000007FEF5C8E000-0x000007FEF5C8F000-memory.dmp

    Filesize

    4KB

  • memory/2492-13-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

    Filesize

    9.6MB

  • memory/2852-22-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-43-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-37-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-36-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2852-34-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-30-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-28-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-26-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-20-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-24-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-40-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-42-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-41-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-32-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-44-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-45-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-46-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-47-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-48-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-49-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-50-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-51-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-52-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-53-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-54-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2852-55-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB